Analysis
-
max time kernel
126s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24-05-2022 22:16
Static task
static1
Behavioral task
behavioral1
Sample
6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe
Resource
win10v2004-20220414-en
General
-
Target
6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe
-
Size
1.9MB
-
MD5
fbaf48e37d532389bc0dbb3bc48c629f
-
SHA1
7b5d1a86826b4f947c14369acce0d27198119bec
-
SHA256
6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f
-
SHA512
945623b3aa28676b93b7b9d49c4dc548b6b5e76838268563abd8ba6d75027567663cb78647698ef908f89ab22de5718f94727cefddfd0a41f38bc5ca60ea61d0
Malware Config
Extracted
buer
http://bbload01.top/
http://bbload02.top/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\ErrorResponder\\errorResponder.exe\"" errorResponder.exe -
resource yara_rule behavioral1/memory/1796-56-0x000000003FC90000-0x0000000040131000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 844 errorResponder.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion errorResponder.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion errorResponder.exe -
Deletes itself 1 IoCs
pid Process 844 errorResponder.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Wine errorResponder.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Wine 6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe -
Loads dropped DLL 8 IoCs
pid Process 1796 6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe 1756 WerFault.exe 1756 WerFault.exe 1756 WerFault.exe 1756 WerFault.exe 1756 WerFault.exe 1756 WerFault.exe 1756 WerFault.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1796 6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe 844 errorResponder.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1756 844 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1796 6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe 844 errorResponder.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1796 wrote to memory of 844 1796 6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe 28 PID 1796 wrote to memory of 844 1796 6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe 28 PID 1796 wrote to memory of 844 1796 6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe 28 PID 1796 wrote to memory of 844 1796 6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe 28 PID 1796 wrote to memory of 844 1796 6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe 28 PID 1796 wrote to memory of 844 1796 6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe 28 PID 1796 wrote to memory of 844 1796 6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe 28 PID 844 wrote to memory of 540 844 errorResponder.exe 29 PID 844 wrote to memory of 540 844 errorResponder.exe 29 PID 844 wrote to memory of 540 844 errorResponder.exe 29 PID 844 wrote to memory of 540 844 errorResponder.exe 29 PID 844 wrote to memory of 1756 844 errorResponder.exe 30 PID 844 wrote to memory of 1756 844 errorResponder.exe 30 PID 844 wrote to memory of 1756 844 errorResponder.exe 30 PID 844 wrote to memory of 1756 844 errorResponder.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe"C:\Users\Admin\AppData\Local\Temp\6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe"1⤵
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\ProgramData\ErrorResponder\errorResponder.exeC:\ProgramData\ErrorResponder\errorResponder.exe "C:\Users\Admin\AppData\Local\Temp\6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks BIOS information in registry
- Deletes itself
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\ErrorResponder\errorResponder.exe3⤵PID:540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 844 -s 3763⤵
- Loads dropped DLL
- Program crash
PID:1756
-
-